
- English
- PDF
- Available on iOS & Android
About this book
This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks, and encourages them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools to secure legacy software and hardware.
Computing has infiltrated all fields nowadays. No one can escape this wave and be immune to security attacks, which continue to evolve, gradually reducing the level of expertise needed by hackers.
It is high time for each and every user to acquire basic knowledge of computer security, which would enable them to mitigate the threats they may face both personally and professionally. It is this combined expertise of individuals and organizations that will guarantee a minimum level of security for families, schools, the workplace and society in general.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half-Title Page
- Title Page
- Copyright Page
- Contents
- List of Acronyms
- Introduction
- 1. General Concepts in Security
- 2. Security Weaknesses
- 3. Authentication Techniques and Tools
- 4. Techniques and Tools for Controlling Access, ACL and Firewalls
- 5. Techniques and Tools for Detecting Intrusions
- 6. Techniques and Tools for Encryption, IPSec and VPN
- 7. New Challenges and Trends in Security, SDN and IoT
- 8. Security Management
- References
- Index
- Other titles from iSTE in Computer Engineering
- EULA